Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Client certificate

Known as: Browser certificate 
In cryptography, a client certificate is a type of digital certificate that is used by client systems to make authenticated requests to a remote… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
A cryptographic checksum is a small data item that is computed from a data structure and can be used to prevent undetected… Expand
2017
2017
The design and implementation of cryptographic systems offer many subtle pitfalls. One such pitfall is that cryptography may… Expand
  • figure 1
  • figure 2
  • table I
  • figure 4
  • figure 3
2017
2017
The number of Internet of Things (IoT) vendors is rapidly growing, providing solutions for all levels of the IoT stack. Despite… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2016
Highly Cited
2016
After a development process of many months, the TLS 1.3 specification is nearly complete. To prevent past mistakes, this crucial… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • table 1
2014
2014
The most widely used secure Internet communication standard TLS (Transport Layer Security) has an optional client certificate… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • table II
Highly Cited
2009
Highly Cited
2009
Many scenarios in medical research are predestined for grid computing. Large amounts of data in complex medical image, biosignal… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
2007
2007
Secure and encrypted authentication is an important aspect of J2EE web application security. SSL client certificate… Expand
2006
2006
Appointments Stanford University, Visiting Scholar, July 2009 June 2010. Schulich School of Business, York University, Associate… Expand
  • figure 1
  • table 1
2005
2005
World Wide Web (WWW) has become a part of the way in which we transfer information. Security and authorization have become a… Expand
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 4
1996
1996
Public key technology presumes the availability of certificates and certifying authorities (CAs) living within a shallow… Expand